메뉴 건너뛰기




Volumn 2007, Issue , 2007, Pages 321-326

Honeypots: Concepts, approaches, and challenges

Author keywords

Honeypots; Legal issues and honeypots; Types of honeypots

Indexed keywords

HONEYPOTS; LEGAL ISSUES AND HONEYPOTS; SECURITY RESOURCE; TYPES OF HONEYPOTS;

EID: 34248399630     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1233341.1233399     Document Type: Conference Paper
Times cited : (158)

References (20)
  • 2
    • 34248346627 scopus 로고    scopus 로고
    • SANS Institiute GIAC Certification GSEC Assignment#1.4: Honey Pots-Strategic Considerations, 2002.
    • SANS Institiute GIAC Certification GSEC Assignment#1.4: Honey Pots-Strategic Considerations, 2002.
  • 3
    • 34248361858 scopus 로고    scopus 로고
    • Wikipedia
    • Wikipedia. http://en.wikipedia.org/wiki/Honeypot (computing).
  • 4
    • 34248353811 scopus 로고    scopus 로고
    • Baumann, R. and Plattner, C. White Paper: Honeypots, Swiss Federal Institute of Technology, Zurich, 2002.
    • Baumann, R. and Plattner, C. White Paper: Honeypots, Swiss Federal Institute of Technology, Zurich, 2002.
  • 6
    • 34248334123 scopus 로고    scopus 로고
    • Harrison, J. Honeypots, the Hottest Thing in Intrusion Detection. http://www.channelinsider.com/article/ Honeypots+the+Hottest+Thing+in+Intrusion+Detection/111384_1.aspx, eWeek Channel Insider, 2003.
    • Harrison, J. Honeypots, the Hottest Thing in Intrusion Detection. http://www.channelinsider.com/article/ Honeypots+the+Hottest+Thing+in+Intrusion+Detection/111384_1.aspx, eWeek Channel Insider, 2003.
  • 7
    • 34248350295 scopus 로고    scopus 로고
    • http://www.honeypots.net/.
  • 8
    • 23944498811 scopus 로고    scopus 로고
    • Honeynets: An Educational Resource for IT Security
    • Salt Lake City, Utah
    • Jones, J.K. and Romney, G.W. Honeynets: An Educational Resource for IT Security SICITE '04, Salt Lake City, Utah, 2004.
    • (2004) SICITE '04
    • Jones, J.K.1    Romney, G.W.2
  • 9
    • 34248326352 scopus 로고    scopus 로고
    • Part 2: Do honeypots constitute entrapment?
    • Kabay, M.E. Honeypots, Part 2: Do honeypots constitute entrapment? Network World, 2003.
    • (2003) Network World
    • Kabay, M.E.H.1
  • 12
    • 34248372786 scopus 로고    scopus 로고
    • SANS Institute, As Part of the Information Security Reading Room
    • Martin, W.W. Honeypots and Honeynets - Security through Deception. http://www.sans.org/reading_room/whitepapers/attacking/41.php. SANS Institute, 2001, As Part of the Information Security Reading Room.
    • (2001) Security through Deception
    • Martin1    Honeypots, W.W.2    Honeynets3
  • 13
    • 34248371132 scopus 로고    scopus 로고
    • Honeypot Background
    • Proves, N. Honeypot Background. http://www.honeyd.org/background.php.
    • Proves, N.1
  • 14
    • 1642516070 scopus 로고    scopus 로고
    • The Honeynet Project: Trapping the Hackers
    • Spitzner, L. The Honeynet Project: Trapping the Hackers. IEEE Security & Privacy, 1 (2). 15-23.
    • IEEE Security & Privacy , vol.1 , Issue.2 , pp. 15-23
    • Spitzner, L.1
  • 16
    • 33751047474 scopus 로고    scopus 로고
    • The Other Honeypot
    • Security Focus
    • Spitzner, L. Honeytokens: The Other Honeypot. http://www. securityfocus.com/infocus/1713, Security Focus, 2003.
    • (2003)
    • Spitzner, L.H.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.